A secure identification and key agreement protocol with user anonymity (SIKA) K Mangipudi, R Katti Computers & Security 25 (6), 420-425, 2006 | 75 | 2006 |

Multiple-output low-power linear feedback shift register design RS Katti, X Ruan, H Khattri IEEE Transactions on Circuits and Systems I: Regular Papers 53 (7), 1487-1495, 2006 | 61 | 2006 |

Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation M De Cock, R Dowsley, C Horst, R Katti, ACA Nascimento, WS Poon, ... IEEE Transactions on Dependable and Secure Computing 16 (2), 217-230, 2017 | 51 | 2017 |

An efficient data-independent technique for compressing test vectors in systems-on-a-chip X Ruan, R Katti IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and …, 2006 | 46 | 2006 |

On the security of randomized arithmetic codes against ciphertext-only attacks RS Katti, SK Srinivasan, A Vosoughi IEEE Transactions on Information Forensics and Security 6 (1), 19-27, 2010 | 43 | 2010 |

A new residue arithmetic error correction scheme RS Katti IEEE transactions on computers 45 (1), 13-19, 1996 | 41 | 1996 |

Low complexity multiplication in a finite field using ring representation R Katti, J Brennan IEEE Transactions on Computers 52 (4), 418-427, 2003 | 40 | 2003 |

Efficient hardware implementation of a new pseudo-random bit sequence generator RS Katti, SK Srinivasan 2009 IEEE International Symposium on Circuits and Systems, 1393-1396, 2009 | 37 | 2009 |

Pseudorandom bit generation using coupled congruential generators RS Katti, RG Kavasseri, V Sai IEEE Transactions on Circuits and Systems II: Express Briefs 57 (3), 203-207, 2010 | 31 | 2010 |

Achieving network on chip fault tolerance by adaptive remapping C Ababei, R Katti 2009 IEEE International Symposium on Parallel & Distributed Processing, 1-4, 2009 | 29 | 2009 |

A modified Booth algorithm for high radix fixed-point multiplication R Katti IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2 (4), 522-524, 1994 | 28 | 1994 |

The alternating greedy expansion and applications to computing digit expansions from left-to-right in cryptography C Heuberger, R Katti, H Prodinger, X Ruan Theoretical computer science 341 (1-3), 55-72, 2005 | 27 | 2005 |

A Hash-based Strong Password Authentication Protocol with User Anonymity. KV Mangipudi, RS Katti IJ Network Security 2 (3), 205-209, 2006 | 26 | 2006 |

Left-to-right optimal signed-binary representation of a pair of integers X Ruan, RS Katti IEEE Transactions on Computers 54 (2), 124-131, 2005 | 26 | 2005 |

Authentication and Key Agreement Protocols Preserving Anonymity. KV Mangipudi, RS Katti, H Fu IJ Network Security 3 (3), 259-270, 2006 | 24 | 2006 |

Secure pseudo-random bit sequence generation using coupled linear congruential generators RS Katti, RG Kavasseri 2008 IEEE International Symposium on Circuits and Systems, 2929-2932, 2008 | 23 | 2008 |

Speeding up elliptic cryptosystems using a new signed binary representation for integers R Katti Proceedings Euromicro Symposium on Digital System Design. Architectures …, 2002 | 22 | 2002 |

Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols B David, R Dowsley, R Katti, ACA Nascimento International Conference on Provable Security, 354-367, 2015 | 19 | 2015 |

A variable length fast message authentication code for secure communication in smart grids R Sule, RS Katti, RG Kavasseri 2012 IEEE Power and Energy Society General Meeting, 1-6, 2012 | 18 | 2012 |

Attacks and solutions on Aydos-Savas-Koc's wireless authentication protocol K Mangipudi, N Malneedi, R Katti, H Fu IEEE Global Telecommunications Conference, 2004. GLOBECOM'04. 4, 2229-2234, 2004 | 16 | 2004 |